2005-02-06 21:26:21 +00:00
|
|
|
// Berkeley Open Infrastructure for Network Computing
|
|
|
|
// http://boinc.berkeley.edu
|
|
|
|
// Copyright (C) 2005 University of California
|
|
|
|
//
|
|
|
|
// This is free software; you can redistribute it and/or
|
|
|
|
// modify it under the terms of the GNU Lesser General Public
|
|
|
|
// License as published by the Free Software Foundation;
|
|
|
|
// either version 2.1 of the License, or (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This software is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
|
// See the GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// To view the GNU Lesser General Public License visit
|
|
|
|
// http://www.gnu.org/copyleft/lesser.html
|
|
|
|
// or write to the Free Software Foundation, Inc.,
|
|
|
|
// 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
|
|
|
|
|
|
#ifdef _WIN32
|
|
|
|
#include "boinc_win.h"
|
|
|
|
#endif
|
2005-11-22 02:11:35 +00:00
|
|
|
|
|
|
|
#ifndef _WIN32
|
2005-11-21 18:34:44 +00:00
|
|
|
#include "config.h"
|
2005-11-22 02:11:35 +00:00
|
|
|
#endif
|
|
|
|
|
2005-02-06 21:26:21 +00:00
|
|
|
#include "parse.h"
|
|
|
|
#include "error_numbers.h"
|
|
|
|
#include "client_msgs.h"
|
2007-02-21 16:26:51 +00:00
|
|
|
#include "str_util.h"
|
2005-02-06 21:26:21 +00:00
|
|
|
#include "file_names.h"
|
|
|
|
#include "filesys.h"
|
|
|
|
#include "client_state.h"
|
2005-08-05 18:41:46 +00:00
|
|
|
#include "gui_http.h"
|
2005-12-14 23:43:50 +00:00
|
|
|
#include "crypt.h"
|
2005-02-06 21:26:21 +00:00
|
|
|
|
|
|
|
#include "acct_mgr.h"
|
|
|
|
|
2005-12-09 07:12:56 +00:00
|
|
|
static const char *run_mode_name[] = {"", "always", "auto", "never"};
|
2005-06-21 08:22:18 +00:00
|
|
|
|
2006-06-01 19:03:00 +00:00
|
|
|
ACCT_MGR_OP::ACCT_MGR_OP() {
|
|
|
|
global_prefs_xml = 0;
|
|
|
|
}
|
|
|
|
|
2006-01-24 21:38:03 +00:00
|
|
|
// do an account manager RPC;
|
2006-10-23 16:00:51 +00:00
|
|
|
// if url is null, defect from current account manager
|
2006-01-24 21:38:03 +00:00
|
|
|
//
|
2005-11-26 00:12:44 +00:00
|
|
|
int ACCT_MGR_OP::do_rpc(
|
2006-06-01 05:29:37 +00:00
|
|
|
std::string url, std::string name, std::string password_hash,
|
|
|
|
bool _via_gui
|
2005-11-26 00:12:44 +00:00
|
|
|
) {
|
2005-02-06 21:26:21 +00:00
|
|
|
int retval;
|
2005-12-09 22:29:21 +00:00
|
|
|
unsigned int i;
|
2006-01-06 23:13:21 +00:00
|
|
|
char buf[256], password[256];
|
|
|
|
FILE *pwdf;
|
2005-02-06 21:26:21 +00:00
|
|
|
|
2006-03-09 10:21:07 +00:00
|
|
|
strlcpy(buf, url.c_str(), sizeof(buf));
|
2005-06-28 23:56:56 +00:00
|
|
|
|
2005-09-15 00:16:55 +00:00
|
|
|
error_num = ERR_IN_PROGRESS;
|
2006-06-01 05:29:37 +00:00
|
|
|
via_gui = _via_gui;
|
2006-06-01 19:03:00 +00:00
|
|
|
if (global_prefs_xml) {
|
|
|
|
free(global_prefs_xml);
|
|
|
|
global_prefs_xml = 0;
|
|
|
|
}
|
2005-09-15 00:16:55 +00:00
|
|
|
|
2006-10-23 16:00:51 +00:00
|
|
|
// if null URL, defect from current AMS
|
|
|
|
//
|
2005-06-28 23:56:56 +00:00
|
|
|
if (!strlen(buf) && strlen(gstate.acct_mgr_info.acct_mgr_url)) {
|
2005-09-15 00:16:55 +00:00
|
|
|
msg_printf(NULL, MSG_INFO, "Removing account manager info");
|
2005-06-28 23:56:56 +00:00
|
|
|
gstate.acct_mgr_info.clear();
|
|
|
|
boinc_delete_file(ACCT_MGR_URL_FILENAME);
|
|
|
|
boinc_delete_file(ACCT_MGR_LOGIN_FILENAME);
|
2005-09-15 00:16:55 +00:00
|
|
|
error_num = 0;
|
2006-01-24 21:38:03 +00:00
|
|
|
for (i=0; i<gstate.projects.size(); i++) {
|
|
|
|
PROJECT* p = gstate.projects[i];
|
|
|
|
p->attached_via_acct_mgr = false;
|
2006-10-23 16:00:51 +00:00
|
|
|
p->ams_resource_share = 0;
|
2006-01-24 21:38:03 +00:00
|
|
|
}
|
2005-06-28 23:56:56 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-06-17 06:31:32 +00:00
|
|
|
canonicalize_master_url(buf);
|
|
|
|
if (!valid_master_url(buf)) {
|
2005-09-15 00:16:55 +00:00
|
|
|
error_num = ERR_INVALID_URL;
|
2005-06-17 06:31:32 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2006-03-07 23:28:27 +00:00
|
|
|
|
2006-03-09 10:21:07 +00:00
|
|
|
strlcpy(ami.acct_mgr_url, url.c_str(), sizeof(ami.acct_mgr_url));
|
|
|
|
strlcpy(ami.acct_mgr_name, "", sizeof(ami.acct_mgr_name));
|
|
|
|
strlcpy(ami.login_name, name.c_str(), sizeof(ami.login_name));
|
|
|
|
strlcpy(ami.password_hash, password_hash.c_str(), sizeof(ami.password_hash));
|
2005-06-21 08:22:18 +00:00
|
|
|
|
2005-12-09 22:29:21 +00:00
|
|
|
FILE* f = boinc_fopen(ACCT_MGR_REQUEST_FILENAME, "w");
|
|
|
|
if (!f) return ERR_FOPEN;
|
|
|
|
fprintf(f,
|
|
|
|
"<acct_mgr_request>\n"
|
|
|
|
" <name>%s</name>\n"
|
2005-12-14 01:44:11 +00:00
|
|
|
" <password_hash>%s</password_hash>\n"
|
2005-12-09 22:29:21 +00:00
|
|
|
" <host_cpid>%s</host_cpid>\n"
|
2006-01-09 07:14:58 +00:00
|
|
|
" <domain_name>%s</domain_name>\n"
|
2005-12-09 22:29:21 +00:00
|
|
|
" <client_version>%d.%d.%d</client_version>\n"
|
2006-06-01 20:53:59 +00:00
|
|
|
" <run_mode>%s</run_mode>\n",
|
2005-12-14 01:44:11 +00:00
|
|
|
name.c_str(), password_hash.c_str(),
|
2005-11-28 00:40:54 +00:00
|
|
|
gstate.host_info.host_cpid,
|
2006-01-09 07:14:58 +00:00
|
|
|
gstate.host_info.domain_name,
|
2006-12-14 00:42:43 +00:00
|
|
|
gstate.core_client_version.major,
|
|
|
|
gstate.core_client_version.minor,
|
|
|
|
gstate.core_client_version.release,
|
2006-11-10 17:55:22 +00:00
|
|
|
run_mode_name[gstate.run_mode.get_perm()]
|
2005-11-28 00:40:54 +00:00
|
|
|
);
|
2006-03-02 07:17:18 +00:00
|
|
|
if (strlen(gstate.acct_mgr_info.previous_host_cpid)) {
|
2006-01-09 07:14:58 +00:00
|
|
|
fprintf(f,
|
|
|
|
" <previous_host_cpid>%s</previous_host_cpid>\n",
|
2006-03-02 07:17:18 +00:00
|
|
|
gstate.acct_mgr_info.previous_host_cpid
|
2006-01-09 07:14:58 +00:00
|
|
|
);
|
|
|
|
}
|
2006-01-06 23:13:21 +00:00
|
|
|
if (gstate.acct_mgr_info.send_gui_rpc_info) {
|
|
|
|
// send GUI RPC port and password hash.
|
|
|
|
// User must enable this by hand
|
|
|
|
// this is for the "farm" account manager so it
|
|
|
|
// can know where to send gui rpc requests to
|
|
|
|
// without having to configure each host
|
|
|
|
//
|
|
|
|
if (gstate.cmdline_gui_rpc_port) {
|
|
|
|
fprintf(f," <gui_rpc_port>%d</gui_rpc_port>\n", gstate.cmdline_gui_rpc_port);
|
|
|
|
} else {
|
|
|
|
fprintf(f," <gui_rpc_port>%d</gui_rpc_port>\n", GUI_RPC_PORT);
|
|
|
|
}
|
|
|
|
if (boinc_file_exists(GUI_RPC_PASSWD_FILE)) {
|
|
|
|
strcpy(password, "");
|
|
|
|
pwdf = fopen(GUI_RPC_PASSWD_FILE, "r");
|
|
|
|
if (pwdf) {
|
2007-03-04 02:30:48 +00:00
|
|
|
if (fgets(password, 256, pwdf)) {
|
|
|
|
strip_whitespace(password);
|
|
|
|
}
|
2006-01-06 23:13:21 +00:00
|
|
|
fclose(pwdf);
|
|
|
|
}
|
|
|
|
fprintf(f," <gui_rpc_password>%s</gui_rpc_password>\n", password);
|
|
|
|
}
|
|
|
|
}
|
2005-12-09 22:29:21 +00:00
|
|
|
for (i=0; i<gstate.projects.size(); i++) {
|
|
|
|
PROJECT* p = gstate.projects[i];
|
2006-01-25 23:43:38 +00:00
|
|
|
fprintf(f,
|
|
|
|
" <project>\n"
|
|
|
|
" <url>%s</url>\n"
|
|
|
|
" <project_name>%s</project_name>\n"
|
|
|
|
" <suspended_via_gui>%d</suspended_via_gui>\n"
|
|
|
|
" <account_key>%s</account_key>\n"
|
|
|
|
" <hostid>%d</hostid>\n"
|
|
|
|
"%s"
|
|
|
|
" </project>\n",
|
|
|
|
p->master_url,
|
|
|
|
p->project_name,
|
|
|
|
p->suspended_via_gui,
|
|
|
|
p->authenticator,
|
|
|
|
p->hostid,
|
|
|
|
p->attached_via_acct_mgr?" <attached_via_acct_mgr/>\n":""
|
|
|
|
);
|
2005-12-09 22:29:21 +00:00
|
|
|
}
|
2006-06-01 19:03:00 +00:00
|
|
|
if (boinc_file_exists(GLOBAL_PREFS_FILE_NAME)) {
|
|
|
|
FILE* fprefs = fopen(GLOBAL_PREFS_FILE_NAME, "r");
|
|
|
|
if (fprefs) {
|
|
|
|
copy_stream(fprefs, f);
|
|
|
|
fclose(fprefs);
|
|
|
|
}
|
|
|
|
}
|
2006-09-12 18:18:15 +00:00
|
|
|
if (strlen(gstate.acct_mgr_info.opaque)) {
|
|
|
|
fprintf(f,
|
|
|
|
" <opaque>\n%s\n"
|
|
|
|
" </opaque>\n",
|
|
|
|
gstate.acct_mgr_info.opaque
|
|
|
|
);
|
|
|
|
}
|
2005-12-09 22:29:21 +00:00
|
|
|
fprintf(f, "</acct_mgr_request>\n");
|
|
|
|
fclose(f);
|
|
|
|
sprintf(buf, "%srpc.php", url.c_str());
|
|
|
|
retval = gstate.gui_http.do_rpc_post(
|
|
|
|
this, buf, ACCT_MGR_REQUEST_FILENAME, ACCT_MGR_REPLY_FILENAME
|
|
|
|
);
|
2005-06-17 06:31:32 +00:00
|
|
|
if (retval) {
|
2005-09-15 00:16:55 +00:00
|
|
|
error_num = retval;
|
2005-06-17 06:31:32 +00:00
|
|
|
return retval;
|
|
|
|
}
|
2005-10-02 18:23:38 +00:00
|
|
|
msg_printf(NULL, MSG_INFO, "Contacting account manager at %s", url.c_str());
|
2005-03-11 00:33:25 +00:00
|
|
|
|
2005-02-06 21:26:21 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-09-12 18:18:15 +00:00
|
|
|
int AM_ACCOUNT::parse(XML_PARSER& xp) {
|
|
|
|
char tag[256];
|
2007-03-21 03:23:50 +00:00
|
|
|
bool is_tag, btemp;
|
2006-09-12 18:18:15 +00:00
|
|
|
int retval;
|
2007-03-21 03:23:50 +00:00
|
|
|
double dtemp;
|
2005-12-15 00:55:09 +00:00
|
|
|
|
2005-12-08 19:21:56 +00:00
|
|
|
detach = false;
|
2006-03-17 20:18:39 +00:00
|
|
|
update = false;
|
2007-03-21 03:23:50 +00:00
|
|
|
dont_request_more_work.init();
|
|
|
|
detach_when_done.init();
|
2005-12-14 23:43:50 +00:00
|
|
|
url = "";
|
2005-12-15 00:55:09 +00:00
|
|
|
strcpy(url_signature, "");
|
2005-12-14 23:43:50 +00:00
|
|
|
authenticator = "";
|
2007-03-21 03:23:50 +00:00
|
|
|
resource_share.init();
|
2005-12-14 23:43:50 +00:00
|
|
|
|
2006-09-12 18:18:15 +00:00
|
|
|
while (!xp.get(tag, sizeof(tag), is_tag)) {
|
|
|
|
if (!is_tag) {
|
|
|
|
if (log_flags.unparsed_xml) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(0, MSG_INFO,
|
|
|
|
"[unparsed_xml] AM_ACCOUNT::parse: unexpected text %s",
|
|
|
|
tag
|
|
|
|
);
|
2006-09-12 18:18:15 +00:00
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (!strcmp(tag, "/account")) {
|
2005-03-10 00:43:22 +00:00
|
|
|
if (url.length() && authenticator.length()) return 0;
|
|
|
|
return ERR_XML_PARSE;
|
|
|
|
}
|
2006-09-12 18:18:15 +00:00
|
|
|
if (xp.parse_string(tag, "url", url)) continue;
|
|
|
|
if (!strcmp(tag, "url_signature")) {
|
|
|
|
retval = xp.element_contents("</url_signature>", url_signature, sizeof(url_signature));
|
2005-12-15 00:55:09 +00:00
|
|
|
if (retval) return retval;
|
2006-09-12 18:18:15 +00:00
|
|
|
strcat(url_signature, "\n");
|
2005-12-15 00:55:09 +00:00
|
|
|
continue;
|
|
|
|
}
|
2006-09-12 18:18:15 +00:00
|
|
|
if (xp.parse_string(tag, "authenticator", authenticator)) continue;
|
|
|
|
if (xp.parse_bool(tag, "detach", detach)) continue;
|
|
|
|
if (xp.parse_bool(tag, "update", update)) continue;
|
2007-03-21 03:23:50 +00:00
|
|
|
if (xp.parse_bool(tag, "dont_request_more_work", btemp)) {
|
|
|
|
dont_request_more_work.set(btemp);
|
|
|
|
}
|
|
|
|
if (xp.parse_bool(tag, "detach_when_done", btemp)) {
|
|
|
|
detach_when_done.set(btemp);
|
|
|
|
}
|
|
|
|
if (xp.parse_double(tag, "resource_share", dtemp)) {
|
|
|
|
resource_share.set(dtemp);
|
|
|
|
}
|
2005-03-10 00:43:22 +00:00
|
|
|
}
|
|
|
|
return ERR_XML_PARSE;
|
2005-02-06 21:26:21 +00:00
|
|
|
}
|
|
|
|
|
2005-12-15 00:55:09 +00:00
|
|
|
int ACCT_MGR_OP::parse(FILE* f) {
|
2006-09-12 18:18:15 +00:00
|
|
|
char tag[1024];
|
|
|
|
bool is_tag;
|
2006-01-09 07:14:58 +00:00
|
|
|
string message;
|
2005-02-06 21:26:21 +00:00
|
|
|
int retval;
|
2006-09-12 18:18:15 +00:00
|
|
|
MIOFILE mf;
|
|
|
|
mf.init_file(f);
|
|
|
|
XML_PARSER xp(&mf);
|
2005-02-06 21:26:21 +00:00
|
|
|
|
|
|
|
accounts.clear();
|
2005-06-21 08:22:18 +00:00
|
|
|
error_str = "";
|
2006-02-01 12:18:10 +00:00
|
|
|
error_num = 0;
|
2005-11-26 00:12:44 +00:00
|
|
|
repeat_sec = 0;
|
2006-06-01 19:03:00 +00:00
|
|
|
strcpy(host_venue, "");
|
2006-09-12 18:18:15 +00:00
|
|
|
strcpy(ami.opaque, "");
|
|
|
|
if (!xp.parse_start("acct_mgr_reply")) return ERR_XML_PARSE;
|
|
|
|
while (!xp.get(tag, sizeof(tag), is_tag)) {
|
|
|
|
if (!is_tag) {
|
|
|
|
if (log_flags.unparsed_xml) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(0, MSG_INFO,
|
|
|
|
"[unparsed_xml] ACCT_MGR_OP::parse: unexpected text %s",
|
|
|
|
tag
|
|
|
|
);
|
2006-09-12 18:18:15 +00:00
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (!strcmp(tag, "/acct_mgr_reply")) return 0;
|
|
|
|
if (xp.parse_str(tag, "name", ami.acct_mgr_name, 256)) continue;
|
|
|
|
if (xp.parse_int(tag, "error_num", error_num)) continue;
|
|
|
|
if (xp.parse_string(tag, "error", error_str)) continue;
|
|
|
|
if (xp.parse_double(tag, "repeat_sec", repeat_sec)) continue;
|
|
|
|
if (xp.parse_string(tag, "message", message)) {
|
2006-01-09 07:14:58 +00:00
|
|
|
msg_printf(NULL, MSG_INFO, "Account manager: %s", message.c_str());
|
|
|
|
continue;
|
|
|
|
}
|
2006-09-12 18:18:15 +00:00
|
|
|
if (!strcmp(tag, "opaque")) {
|
|
|
|
retval = xp.element_contents("</opaque>", ami.opaque, sizeof(ami.opaque));
|
|
|
|
if (retval) return retval;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (!strcmp(tag, "signing_key")) {
|
|
|
|
retval = xp.element_contents("</signing_key>", ami.signing_key, sizeof(ami.signing_key));
|
2005-12-15 00:55:09 +00:00
|
|
|
if (retval) return retval;
|
|
|
|
continue;
|
|
|
|
}
|
2006-11-02 00:16:02 +00:00
|
|
|
if (!strcmp(tag, "account")) {
|
2005-11-26 00:12:44 +00:00
|
|
|
AM_ACCOUNT account;
|
2006-09-12 18:18:15 +00:00
|
|
|
retval = account.parse(xp);
|
2005-03-10 00:43:22 +00:00
|
|
|
if (!retval) accounts.push_back(account);
|
2005-12-15 00:55:09 +00:00
|
|
|
continue;
|
2005-03-10 00:43:22 +00:00
|
|
|
}
|
2006-11-02 00:16:02 +00:00
|
|
|
if (!strcmp(tag, "global_preferences")) {
|
2006-06-01 19:03:00 +00:00
|
|
|
retval = dup_element_contents(
|
|
|
|
f,
|
|
|
|
"</global_preferences>",
|
|
|
|
&global_prefs_xml
|
|
|
|
);
|
|
|
|
if (retval) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(NULL, MSG_INTERNAL_ERROR,
|
2006-06-01 19:03:00 +00:00
|
|
|
"Can't parse global prefs in account manager reply: %s",
|
|
|
|
boincerror(retval)
|
|
|
|
);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
2006-11-02 00:16:02 +00:00
|
|
|
if (xp.parse_str(tag, "host_venue", host_venue, sizeof(host_venue))) continue;
|
2005-03-10 00:43:22 +00:00
|
|
|
}
|
2005-02-06 21:26:21 +00:00
|
|
|
return ERR_XML_PARSE;
|
|
|
|
}
|
|
|
|
|
2005-08-05 22:00:19 +00:00
|
|
|
void ACCT_MGR_OP::handle_reply(int http_op_retval) {
|
2005-03-10 00:43:22 +00:00
|
|
|
unsigned int i;
|
2005-08-05 18:41:46 +00:00
|
|
|
int retval;
|
2005-12-14 23:43:50 +00:00
|
|
|
bool verified;
|
2005-11-26 00:12:44 +00:00
|
|
|
PROJECT* pp;
|
2005-12-15 00:55:09 +00:00
|
|
|
bool sig_ok;
|
2005-08-05 18:41:46 +00:00
|
|
|
|
|
|
|
if (http_op_retval == 0) {
|
|
|
|
FILE* f = fopen(ACCT_MGR_REPLY_FILENAME, "r");
|
|
|
|
if (f) {
|
2005-12-15 00:55:09 +00:00
|
|
|
retval = parse(f);
|
2005-08-05 18:41:46 +00:00
|
|
|
fclose(f);
|
|
|
|
} else {
|
|
|
|
retval = ERR_FOPEN;
|
|
|
|
}
|
|
|
|
} else {
|
2006-02-01 12:18:10 +00:00
|
|
|
error_num = http_op_retval;
|
2005-08-05 18:41:46 +00:00
|
|
|
}
|
2006-02-01 12:18:10 +00:00
|
|
|
|
2006-06-01 05:29:37 +00:00
|
|
|
gstate.acct_mgr_info.password_error = false;
|
|
|
|
if (error_num == ERR_BAD_PASSWD && !via_gui) {
|
|
|
|
gstate.acct_mgr_info.password_error = true;
|
|
|
|
}
|
2006-02-01 12:18:10 +00:00
|
|
|
// check both error_str and error_num since an account manager may only
|
|
|
|
// return a BOINC based error code for password failures or invalid
|
|
|
|
// email addresses
|
|
|
|
//
|
|
|
|
if (error_str.size()) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(NULL, MSG_USER_ERROR,
|
|
|
|
"Account manager error: %d %s", error_num, error_str.c_str()
|
|
|
|
);
|
2006-02-01 12:18:10 +00:00
|
|
|
if (!error_num) {
|
|
|
|
error_num = ERR_XML_PARSE;
|
|
|
|
}
|
|
|
|
} else if (error_num) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(NULL, MSG_USER_ERROR,
|
|
|
|
"Account manager error: %s", boincerror(error_num)
|
|
|
|
);
|
2006-01-09 07:14:58 +00:00
|
|
|
}
|
2005-06-21 08:22:18 +00:00
|
|
|
|
2006-02-01 12:18:10 +00:00
|
|
|
if (error_num) return;
|
|
|
|
|
|
|
|
msg_printf(NULL, MSG_INFO, "Account manager contact succeeded");
|
|
|
|
|
2005-12-14 23:43:50 +00:00
|
|
|
// demand a signing key
|
|
|
|
//
|
2005-12-15 00:55:09 +00:00
|
|
|
sig_ok = true;
|
2005-12-14 23:43:50 +00:00
|
|
|
if (!strlen(ami.signing_key)) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(NULL, MSG_INTERNAL_ERROR,
|
|
|
|
"No signing key from account manager"
|
|
|
|
);
|
2005-12-15 00:55:09 +00:00
|
|
|
sig_ok = false;
|
2005-12-14 23:43:50 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// don't accept new signing key if we already have one
|
|
|
|
//
|
|
|
|
if (strlen(gstate.acct_mgr_info.signing_key)
|
|
|
|
&& strcmp(gstate.acct_mgr_info.signing_key, ami.signing_key)
|
|
|
|
) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(NULL, MSG_INTERNAL_ERROR,
|
|
|
|
"Inconsistent signing key from account manager"
|
|
|
|
);
|
2005-12-15 00:55:09 +00:00
|
|
|
sig_ok = false;
|
2005-12-14 23:43:50 +00:00
|
|
|
}
|
2005-06-21 08:22:18 +00:00
|
|
|
|
2005-12-15 00:55:09 +00:00
|
|
|
if (sig_ok) {
|
2006-03-15 03:33:26 +00:00
|
|
|
strcpy(gstate.acct_mgr_info.acct_mgr_url, ami.acct_mgr_url);
|
2006-03-02 07:17:18 +00:00
|
|
|
strcpy(gstate.acct_mgr_info.acct_mgr_name, ami.acct_mgr_name);
|
|
|
|
strcpy(gstate.acct_mgr_info.signing_key, ami.signing_key);
|
2006-03-07 23:28:27 +00:00
|
|
|
strcpy(gstate.acct_mgr_info.login_name, ami.login_name);
|
|
|
|
strcpy(gstate.acct_mgr_info.password_hash, ami.password_hash);
|
2006-09-12 18:18:15 +00:00
|
|
|
strcpy(gstate.acct_mgr_info.opaque, ami.opaque);
|
2005-12-15 00:55:09 +00:00
|
|
|
|
2006-06-01 19:03:00 +00:00
|
|
|
// process projects
|
2005-12-15 00:55:09 +00:00
|
|
|
//
|
|
|
|
for (i=0; i<accounts.size(); i++) {
|
|
|
|
AM_ACCOUNT& acct = accounts[i];
|
|
|
|
retval = verify_string2(acct.url.c_str(), acct.url_signature, ami.signing_key, verified);
|
|
|
|
if (retval || !verified) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(NULL, MSG_INTERNAL_ERROR,
|
|
|
|
"Bad signature for URL %s", acct.url.c_str()
|
|
|
|
);
|
2005-12-15 00:55:09 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
pp = gstate.lookup_project(acct.url.c_str());
|
|
|
|
if (pp) {
|
|
|
|
if (acct.detach) {
|
|
|
|
gstate.detach_project(pp);
|
2005-12-08 19:21:56 +00:00
|
|
|
} else {
|
2005-12-15 00:55:09 +00:00
|
|
|
if (strcmp(pp->authenticator, acct.authenticator.c_str())) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(pp, MSG_INFO,
|
2005-12-15 00:55:09 +00:00
|
|
|
"Already attached under another account"
|
|
|
|
);
|
|
|
|
} else {
|
2006-05-09 19:34:30 +00:00
|
|
|
//msg_printf(pp, MSG_INFO, "Already attached");
|
2005-12-15 00:55:09 +00:00
|
|
|
pp->attached_via_acct_mgr = true;
|
2007-03-21 03:23:50 +00:00
|
|
|
if (acct.dont_request_more_work.present) {
|
|
|
|
pp->dont_request_more_work = acct.dont_request_more_work.value;
|
|
|
|
}
|
|
|
|
if (acct.detach_when_done.present) {
|
|
|
|
pp->detach_when_done = acct.detach_when_done.value;
|
|
|
|
}
|
2006-03-17 20:18:39 +00:00
|
|
|
|
|
|
|
// initiate a scheduler RPC if requested by AMS
|
|
|
|
//
|
|
|
|
if (acct.update) {
|
2006-09-01 22:21:20 +00:00
|
|
|
pp->sched_rpc_pending = RPC_REASON_ACCT_MGR_REQ;
|
2006-03-17 20:18:39 +00:00
|
|
|
pp->min_rpc_time = 0;
|
|
|
|
}
|
2007-03-21 03:23:50 +00:00
|
|
|
if (acct.resource_share.present) {
|
|
|
|
pp->ams_resource_share = acct.resource_share.value;
|
2006-10-23 16:00:51 +00:00
|
|
|
pp->resource_share = pp->ams_resource_share;
|
2007-01-26 23:40:05 +00:00
|
|
|
} else {
|
|
|
|
// no host-specific resource share;
|
|
|
|
// if currently have one, restore to value from web
|
|
|
|
//
|
|
|
|
if (pp->ams_resource_share >= 0) {
|
|
|
|
pp->ams_resource_share = -1;
|
|
|
|
PROJECT p2;
|
|
|
|
strcpy(p2.master_url, pp->master_url);
|
|
|
|
retval = p2.parse_account_file();
|
|
|
|
if (!retval) {
|
|
|
|
pp->resource_share = p2.resource_share;
|
|
|
|
} else {
|
|
|
|
pp->resource_share = 100;
|
|
|
|
}
|
|
|
|
}
|
2006-10-23 16:00:51 +00:00
|
|
|
}
|
2005-12-15 00:55:09 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!acct.detach) {
|
2006-03-17 20:18:39 +00:00
|
|
|
msg_printf(NULL, MSG_INFO,
|
|
|
|
"Attaching to %s", acct.url.c_str()
|
|
|
|
);
|
|
|
|
gstate.add_project(
|
2006-12-26 00:37:25 +00:00
|
|
|
acct.url.c_str(), acct.authenticator.c_str(), "", true
|
2006-03-17 20:18:39 +00:00
|
|
|
);
|
2005-12-08 19:21:56 +00:00
|
|
|
}
|
|
|
|
}
|
2005-11-26 00:12:44 +00:00
|
|
|
}
|
2006-06-01 19:03:00 +00:00
|
|
|
|
2006-06-02 20:32:20 +00:00
|
|
|
bool read_prefs = false;
|
|
|
|
if (strlen(host_venue) && strcmp(host_venue, gstate.main_host_venue)) {
|
|
|
|
strcpy(gstate.main_host_venue, host_venue);
|
|
|
|
read_prefs = true;
|
|
|
|
}
|
|
|
|
|
2006-06-01 19:03:00 +00:00
|
|
|
// process prefs if any
|
|
|
|
//
|
|
|
|
if (global_prefs_xml) {
|
|
|
|
retval = gstate.save_global_prefs(
|
|
|
|
global_prefs_xml, ami.acct_mgr_url, ami.acct_mgr_url
|
|
|
|
);
|
|
|
|
if (retval) {
|
2007-01-25 23:39:06 +00:00
|
|
|
msg_printf(NULL, MSG_INTERNAL_ERROR, "Can't save global prefs");
|
2006-06-01 19:03:00 +00:00
|
|
|
}
|
2006-06-02 20:32:20 +00:00
|
|
|
read_prefs = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// process prefs if prefs or venue changed
|
|
|
|
//
|
|
|
|
if (read_prefs) {
|
|
|
|
gstate.read_global_prefs();
|
2006-06-01 19:03:00 +00:00
|
|
|
}
|
2005-11-26 00:12:44 +00:00
|
|
|
}
|
|
|
|
|
2006-03-02 07:17:18 +00:00
|
|
|
strcpy(gstate.acct_mgr_info.previous_host_cpid, gstate.host_info.host_cpid);
|
2005-11-26 00:12:44 +00:00
|
|
|
if (repeat_sec) {
|
|
|
|
gstate.acct_mgr_info.next_rpc_time = gstate.now + repeat_sec;
|
|
|
|
} else {
|
|
|
|
gstate.acct_mgr_info.next_rpc_time = gstate.now + 86400;
|
2005-03-11 00:33:25 +00:00
|
|
|
}
|
2005-12-09 22:29:21 +00:00
|
|
|
gstate.acct_mgr_info.write_info();
|
2005-12-15 00:55:09 +00:00
|
|
|
gstate.set_client_state_dirty("account manager RPC");
|
2005-02-06 21:26:21 +00:00
|
|
|
}
|
2005-06-21 08:22:18 +00:00
|
|
|
|
|
|
|
int ACCT_MGR_INFO::write_info() {
|
|
|
|
FILE* p;
|
2005-06-28 23:56:56 +00:00
|
|
|
if (strlen(acct_mgr_url)) {
|
2005-06-21 08:22:18 +00:00
|
|
|
p = fopen(ACCT_MGR_URL_FILENAME, "w");
|
|
|
|
if (p) {
|
2005-12-14 23:43:50 +00:00
|
|
|
fprintf(p,
|
2005-06-21 08:22:18 +00:00
|
|
|
"<acct_mgr>\n"
|
|
|
|
" <name>%s</name>\n"
|
2005-12-14 23:43:50 +00:00
|
|
|
" <url>%s</url>\n",
|
2005-06-28 23:56:56 +00:00
|
|
|
acct_mgr_name,
|
|
|
|
acct_mgr_url
|
2005-06-21 08:22:18 +00:00
|
|
|
);
|
2006-03-02 07:17:18 +00:00
|
|
|
if (send_gui_rpc_info) fprintf(p," <send_gui_rpc_info/>\n");
|
2005-12-14 23:43:50 +00:00
|
|
|
if (strlen(signing_key)) {
|
|
|
|
fprintf(p,
|
2006-09-12 18:18:15 +00:00
|
|
|
" <signing_key>\n%s\n</signing_key>\n",
|
2005-12-14 23:43:50 +00:00
|
|
|
signing_key
|
|
|
|
);
|
|
|
|
}
|
|
|
|
fprintf(p,
|
|
|
|
"</acct_mgr>\n"
|
|
|
|
);
|
2005-06-21 08:22:18 +00:00
|
|
|
fclose(p);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-06-28 23:56:56 +00:00
|
|
|
if (strlen(login_name)) {
|
2005-06-21 08:22:18 +00:00
|
|
|
p = fopen(ACCT_MGR_LOGIN_FILENAME, "w");
|
|
|
|
if (p) {
|
|
|
|
fprintf(
|
|
|
|
p,
|
|
|
|
"<acct_mgr_login>\n"
|
|
|
|
" <login>%s</login>\n"
|
2005-12-14 01:44:11 +00:00
|
|
|
" <password_hash>%s</password_hash>\n"
|
2006-01-09 07:14:58 +00:00
|
|
|
" <previous_host_cpid>%s</previous_host_cpid>\n"
|
2005-11-26 00:12:44 +00:00
|
|
|
" <next_rpc_time>%f</next_rpc_time>\n"
|
2006-09-12 18:18:15 +00:00
|
|
|
" <opaque>\n%s\n"
|
|
|
|
" </opaque>\n"
|
2005-06-21 08:22:18 +00:00
|
|
|
"</acct_mgr_login>\n",
|
2005-06-28 23:56:56 +00:00
|
|
|
login_name,
|
2005-12-14 01:44:11 +00:00
|
|
|
password_hash,
|
2006-01-09 07:14:58 +00:00
|
|
|
previous_host_cpid,
|
2006-09-12 18:18:15 +00:00
|
|
|
next_rpc_time,
|
|
|
|
opaque
|
2005-06-21 08:22:18 +00:00
|
|
|
);
|
|
|
|
fclose(p);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-06-28 23:56:56 +00:00
|
|
|
void ACCT_MGR_INFO::clear() {
|
|
|
|
strcpy(acct_mgr_name, "");
|
|
|
|
strcpy(acct_mgr_url, "");
|
|
|
|
strcpy(login_name, "");
|
2005-12-14 01:44:11 +00:00
|
|
|
strcpy(password_hash, "");
|
2005-12-14 23:43:50 +00:00
|
|
|
strcpy(signing_key, "");
|
2006-01-09 07:14:58 +00:00
|
|
|
strcpy(previous_host_cpid, "");
|
2006-09-12 18:18:15 +00:00
|
|
|
strcpy(opaque, "");
|
2005-12-09 22:29:21 +00:00
|
|
|
next_rpc_time = 0;
|
2006-01-06 23:13:21 +00:00
|
|
|
send_gui_rpc_info = false;
|
2006-06-01 05:29:37 +00:00
|
|
|
password_error = false;
|
2005-06-28 23:56:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ACCT_MGR_INFO::ACCT_MGR_INFO() {
|
|
|
|
clear();
|
|
|
|
}
|
|
|
|
|
2006-11-03 19:24:21 +00:00
|
|
|
int ACCT_MGR_INFO::parse_login_file(FILE* p) {
|
|
|
|
char tag[1024];
|
|
|
|
bool is_tag;
|
|
|
|
MIOFILE mf;
|
|
|
|
int retval;
|
|
|
|
|
|
|
|
mf.init_file(p);
|
|
|
|
XML_PARSER xp(&mf);
|
|
|
|
if (!xp.parse_start("acct_mgr_login")) {
|
|
|
|
//
|
|
|
|
}
|
|
|
|
while (!xp.get(tag, sizeof(tag), is_tag)) {
|
|
|
|
if (!is_tag) {
|
|
|
|
printf("unexpected text: %s\n", tag);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (!strcmp(tag, "/acct_mgr_login")) break;
|
|
|
|
else if (xp.parse_str(tag, "login", login_name, 256)) continue;
|
|
|
|
else if (xp.parse_str(tag, "password_hash", password_hash, 256)) continue;
|
|
|
|
else if (xp.parse_str(tag, "previous_host_cpid", previous_host_cpid, sizeof(previous_host_cpid))) continue;
|
|
|
|
else if (xp.parse_double(tag, "next_rpc_time", next_rpc_time)) continue;
|
|
|
|
else if (!strcmp(tag, "opaque")) {
|
|
|
|
retval = xp.element_contents("</opaque>", opaque, sizeof(opaque));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-06-21 08:22:18 +00:00
|
|
|
int ACCT_MGR_INFO::init() {
|
2006-09-12 18:18:15 +00:00
|
|
|
char tag[1024];
|
|
|
|
bool is_tag;
|
2005-06-21 08:22:18 +00:00
|
|
|
MIOFILE mf;
|
|
|
|
FILE* p;
|
2005-12-14 23:43:50 +00:00
|
|
|
int retval;
|
2005-06-21 08:22:18 +00:00
|
|
|
|
2005-06-28 23:56:56 +00:00
|
|
|
clear();
|
2005-06-21 08:22:18 +00:00
|
|
|
p = fopen(ACCT_MGR_URL_FILENAME, "r");
|
2005-12-14 23:43:50 +00:00
|
|
|
if (!p) return 0;
|
|
|
|
mf.init_file(p);
|
2006-09-12 18:18:15 +00:00
|
|
|
XML_PARSER xp(&mf);
|
|
|
|
if (!xp.parse_start("acct_mgr_login")) {
|
|
|
|
//
|
|
|
|
}
|
|
|
|
while (!xp.get(tag, sizeof(tag), is_tag)) {
|
|
|
|
if (!is_tag) {
|
|
|
|
printf("unexpected text: %s\n", tag);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (!strcmp(tag, "/acct_mgr")) break;
|
|
|
|
else if (xp.parse_str(tag, "name", acct_mgr_name, 256)) continue;
|
|
|
|
else if (xp.parse_str(tag, "url", acct_mgr_url, 256)) continue;
|
|
|
|
else if (xp.parse_bool(tag, "send_gui_rpc_info", send_gui_rpc_info)) continue;
|
|
|
|
else if (!strcmp(tag, "signing_key")) {
|
|
|
|
retval = xp.element_contents("</signing_key>", signing_key, sizeof(signing_key));
|
|
|
|
continue;
|
2005-06-21 08:22:18 +00:00
|
|
|
}
|
|
|
|
}
|
2005-12-14 23:43:50 +00:00
|
|
|
fclose(p);
|
2005-06-21 08:22:18 +00:00
|
|
|
|
|
|
|
p = fopen(ACCT_MGR_LOGIN_FILENAME, "r");
|
|
|
|
if (p) {
|
2006-11-03 19:24:21 +00:00
|
|
|
parse_login_file(p);
|
2005-06-21 08:22:18 +00:00
|
|
|
fclose(p);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2005-09-22 08:46:51 +00:00
|
|
|
|
2005-11-26 00:12:44 +00:00
|
|
|
bool ACCT_MGR_INFO::poll() {
|
|
|
|
if (gstate.acct_mgr_op.error_num == ERR_IN_PROGRESS) return false;
|
2006-02-01 12:18:10 +00:00
|
|
|
|
|
|
|
// if we do not any any credentials we shouldn't attempt to contact
|
|
|
|
// the account manager should should reject us anyway for a bad
|
|
|
|
// login. This also avoids the bug where the content of
|
|
|
|
// acct_mgr_url.xml is overwritten with incomplete information such
|
|
|
|
// as the account manager name.
|
|
|
|
//
|
|
|
|
if (!strlen(login_name) && !strlen(password_hash)) return false;
|
|
|
|
|
2005-11-26 00:12:44 +00:00
|
|
|
if (gstate.now > next_rpc_time) {
|
2005-11-28 06:28:55 +00:00
|
|
|
next_rpc_time = gstate.now + 86400;
|
2006-06-01 05:29:37 +00:00
|
|
|
gstate.acct_mgr_op.do_rpc(
|
|
|
|
acct_mgr_url, login_name, password_hash, false
|
|
|
|
);
|
2005-11-26 00:12:44 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2005-02-11 04:46:01 +00:00
|
|
|
const char *BOINC_RCSID_8fd9e873bf="$Id$";
|